Sciweavers

1919 search results - page 285 / 384
» Recent Extensions to Traviando
Sort
View
INFOCOM
2009
IEEE
15 years 11 months ago
Lightweight Remote Image Management for Secure Code Dissemination in Wireless Sensor Networks
Abstract—Wireless sensor networks are considered ideal candidates for a wide range of applications. It is desirable and sometimes necessary to reprogram sensor nodes through wire...
An Liu, Peng Ning, Chun Wang
ECSQARU
2009
Springer
15 years 11 months ago
Encompassing Attacks to Attacks in Abstract Argumentation Frameworks
sing Attacks to Attacks in Abstract Argumentation Frameworks Pietro Baroni, Federico Cerutti, Massimiliano Giacomin, and Giovanni Guida Dipartimento di Elettronica per l’Automazi...
Pietro Baroni, Federico Cerutti, Massimiliano Giac...
ACSC
2007
IEEE
15 years 11 months ago
Hybrid Mesh Ad-Hoc On-Demand Distance Vector Routing Protocol
Wireless Mesh Networks (WMNs) have recently gained increasing attention and have emerged as a technology with great potential for a wide range of applications. WMNs can be conside...
Asad Amir Pirzada, Marius Portmann, Jadwiga Induls...
ICC
2007
IEEE
103views Communications» more  ICC 2007»
15 years 11 months ago
Providing Differentiated Quality-of-Protection for Surviving Double-Link Failures in WDM Mesh Networks
—Providing differentiated Quality-of-Protection (QoP) for surviving single-link failures in WDM mesh networks has been extensively studied in recent years. This paper investigate...
Xu Shao, Luying Zhou, Weiguo Zheng, Yixin Wang
151
Voted
TPHOL
2007
IEEE
15 years 11 months ago
Using XCAP to Certify Realistic Systems Code: Machine Context Management
Formal, modular, and mechanized verification of realistic systems code is desirable but challenging. Verification of machine context management (a basis of multi-tasking) is one ...
Zhaozhong Ni, Dachuan Yu, Zhong Shao